Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Visual structures for seeing cyber policy strategies
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
information synthesis
visualization
visual structures
Verizon 2014 Data Breach Report
terrorist attack
Terrorism
Situation Awareness
security of data
pubcrawl170109
Organizations
information visibility
Complexity theory
Human-computer interaction
Data visualization
data visualisation
cyber security policy
cyber security
cyber policy strategies
cyber incident detection
Cyber Attacks
computer security
biblio
Physically Unclonable Digital ID
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
physically unclonable function
Hash functions
identification of persons
identity management systems
Immune system
mobile hardware security
Optical imaging
Optical sensors
physically unclonable digital ID
encryption keys
pubcrawl170109
PUF
Q-PUDID
quasi-PUDID
random number generation
Servers
two-factor authentication
Access Control
dynamic human identity
digital signatures
digital identity thefts
device authentication
descrambler-hardware authentication
cyber security
Cryptography
cryptanalysis
computer security
Cloning
clonable static information
center for strategic and international studies
biometrics
authorisation
authentication
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 1:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
"FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics"
Submitted by abfox on Tue, 02/14/2017 - 12:28pm
highly scalable distributed feature collection and correlation engine analysis engine
time windows
security of data
security intelligence
security analytics
real-time systems
query processing
pubcrawl170101
production network query
low latency query responses
low latency Big Data analytics
IP networks
advanced persistent threat infection detection
geographically distributed large data sets
fluxing domain name detection
Feature Selection
feature extraction
FCCE
Distributed databases
Data mining
cyber security domain
Correlation
computer security
Big Data
biblio
"Stealthy attacks meets insider threats: A three-player game model"
Submitted by abfox on Tue, 02/14/2017 - 12:18pm
advanced persistent threat
Computational modeling
computer security
cyber security
Face
game theory
Games
Insider Threats
Numerical models
pubcrawl170101
real-time systems
security of data
stealthy attacks
three-player attacker-defender insider game
three-player game model
two-player FlipIt game model
biblio
"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Submitted by abfox on Tue, 02/14/2017 - 11:44am
malware
virtual networks
pubcrawl170101
Protocols
Ports (Computers)
penetration and exploration phase
path control
OpenFlow technology
OpenFlow
network security
mission execution phase
malware responding system
malware detection system
malware communication
advanced persistent threat attacks
IP networks
invasive software
intrusion detection system
initial compromise phase
entry control measures
Dynamic Responding
Digital Forensics
Databases
computer security
computer network security
attacking infrastructure building phase
APT attacks
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
next ›
last »